Professional Documents
Culture Documents
2 Project Title
Defending Suspected Users by Exploiting Specific Distance Metric in Collaborative
Filtering Recommender Systems
3 Project Option
4 Internal Guide
5 Sponsorship and External Guide
6 Technical Keywords (As per ACM Keywords)
Recommender System, Collabrative Filtering, Schilling Attack, Nuke And Push Attack
7. Problem Statement
Existing methods are not able to differentiate between genuine and fake User. This paper
proposes method to improve the accuracy to differentiate attack and genuine user. The approach
consists of two stages: the stage of filtering out genuine users by exploiting suspected target
items and the stage of discriminating attackers by employing a new similarity metric. At the first
stage, we filter out a part of genuine users in order to reduce the computation time.
8. Abstract:A recommender system produces a list of suggestions for users based on their
preferences. It is an intelligent system that can help users to come across their interesting items.
Mostly In E-commerce websites, recommender systems employ the collaborative filtering
algorithm which is one of the most successful techniques. But, CFRSs are highly vulnerable to
shilling attacks or profile injection attacks. Previous methods lack the accuracy in
differentiating attack users from genuine users and have lot of computation time. This paper
proposes method to improve accuracy of differentiating attack and genuine user and improves
computation time too.
9. Goals and Objectives:
We develop a scheme for improving accuracy in discriminating attack user form genuine
Mathematical formulation:
Detection rate is defined as the number of detected attack profiles divided by the number
of attack profiles.
detection rate = No of Detection / No of Attack Profiles
False alarm rate is the number of genuine profiles that are predicted as attack profiles
divided by the number of genuine profiles.
False alarm rate =No of False alarm / No of Genuine Profiles
Success Conditions: Fake profile injection can be stopped and we can provide unbiased
recommendation to user.
Failure Conditions: Due to schilling attack recommendation lists can be altered by fake
users.
[9] C. E. Seminario and D. C. Wilson., Attacking item-based recommender systems with power
items, ACM Conference on Recommender Systems, pp. 5764, 2014.
[10] J. Hu, D. C. Zhan, X. Wu, Y. Jiang, and Z. H. Zhou, Pairwised specific distance learning
from physical linkages, ACM Trans. Knowl. Discov. Data, 2014.
13. Plan of Project Execution